ICSA Labs Blog: Anti-Malware

Understanding the benefits of ICSA Labs certification

Knowing the benefits of certification is important for security product vendors and enterprises to understand.

The first step is to understand what certification is and what it is not.

Striking a Balance Between Privacy and Technology -- Navigating the Microsoft 10 “Free” Upgrade

The widely covered launch of Windows 10 has elicited numerous warnings from privacy advocates and online security experts in recent weeks.  Why?

Protecting Your Mobile Phone from Ransomware [PART 2]

As consumers increasingly turn to their mobile phones for shopping, banking, working and internet browsing, cybercriminals have similarly begun to evolve their tactics to keep up with the growth in mobile phone usage. 

Protecting your PC from Ransomware [PART 1]

Ransomware is a type of phishing attack that occurs when an attacker sends an email that looks as if it is from a legitimate organization but contains a link or attachment to malware or ransomware.

Once the ransomware is downloaded it restricts access to the computer system it infects and demands a ransom be paid to the creator(s) of the malware in order for the restriction to be removed.

Unfortunately, even when the ‘ransom’ is paid, most often the system remains infected and needs to be wiped clean.

Why Certify? The Significance of ICSA Labs Certification

When it comes to security, many vendors consider certification of its products by an independent organization an option, not a requirement. However, third party testing is an important element when a company is deciding on technology solutions that are part of its security management program.

Q&A: George Japak of ICSA Labs Offers Advice around NCSA Month

This month marks the 11th anniversary of National Cyber Security Awareness Month (NCSAM) where raising awareness about cybersecurity is a top priority for both the public and private sector.

ICSA Labs new certification option - Malicious URL testing module

When ICSA Labs first started testing and certifying Anti-Virus products more than 20 years ago, there were only “hundreds” of malware samples circulating monthly in the world. Since then, the malware landscape has changed dramatically and today there are over 100,000 new samples appearing every day.


One of my friends recently received an alert from her sheriff’s office, warning her about something called Cryptolocker. The language in the alert was quite alarming, and she wanted my opinion.

I told her that Cryptolocker was indeed real and is the criminal’s monetization scheme-du-jour. While it is a real pain if you got nailed by it, basic security practices would keep you perfectly safe.

The Age Of Enterprise Malware (A.k.a APT vs AFT)

In 2013, most people understand that the acronym APT stands for Advanced Persistent Threat, but I’m coining a new one … AFT, which stands for Another… uh … Freaking Trojan, and I suggest that all malware now falls into one of these two categories.

Lessons from the latest Mac malware

One of the Hoary Old Chestnuts of computer security is that “SMB don’t get 0-days”. Aside from arguably bad grammar, the latest Mac malware shows this to be patently false.

What is meant by “SMB don’t get 0-days” is that brand-new exploits, or zero-days, are relatively hard to write, and possibly expensive, and therefore tend to be used against high-value targets, such as Fortune 500 companies, or military, rather than being “wasted” against Small and Medium Business, who by implication have nothing worth stealing.